inspec 2.1.81 → 2.1.83
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -5
- data/.rubocop.yml +101 -101
- data/CHANGELOG.md +3183 -3177
- data/Gemfile +56 -56
- data/LICENSE +14 -14
- data/MAINTAINERS.md +33 -33
- data/MAINTAINERS.toml +52 -52
- data/README.md +453 -453
- data/Rakefile +349 -349
- data/bin/inspec +12 -12
- data/docs/.gitignore +2 -2
- data/docs/README.md +41 -40
- data/docs/dev/control-eval.md +61 -61
- data/docs/dsl_inspec.md +258 -258
- data/docs/dsl_resource.md +100 -100
- data/docs/glossary.md +99 -99
- data/docs/habitat.md +191 -191
- data/docs/inspec_and_friends.md +114 -114
- data/docs/matchers.md +169 -169
- data/docs/migration.md +293 -293
- data/docs/platforms.md +118 -118
- data/docs/plugin_kitchen_inspec.md +50 -50
- data/docs/profiles.md +378 -378
- data/docs/reporters.md +105 -105
- data/docs/resources/aide_conf.md.erb +75 -75
- data/docs/resources/apache.md.erb +67 -67
- data/docs/resources/apache_conf.md.erb +68 -68
- data/docs/resources/apt.md.erb +71 -71
- data/docs/resources/audit_policy.md.erb +47 -47
- data/docs/resources/auditd.md.erb +79 -79
- data/docs/resources/auditd_conf.md.erb +68 -68
- data/docs/resources/aws_cloudtrail_trail.md.erb +155 -155
- data/docs/resources/aws_cloudtrail_trails.md.erb +86 -86
- data/docs/resources/aws_cloudwatch_alarm.md.erb +91 -91
- data/docs/resources/aws_cloudwatch_log_metric_filter.md.erb +154 -154
- data/docs/resources/aws_config_delivery_channel.md.erb +101 -101
- data/docs/resources/aws_config_recorder.md.erb +86 -86
- data/docs/resources/aws_ec2_instance.md.erb +112 -112
- data/docs/resources/aws_ec2_instances.md.erb +79 -79
- data/docs/resources/aws_iam_access_key.md.erb +129 -129
- data/docs/resources/aws_iam_access_keys.md.erb +204 -204
- data/docs/resources/aws_iam_group.md.erb +64 -64
- data/docs/resources/aws_iam_groups.md.erb +49 -49
- data/docs/resources/aws_iam_password_policy.md.erb +82 -82
- data/docs/resources/aws_iam_policies.md.erb +87 -87
- data/docs/resources/aws_iam_policy.md.erb +245 -245
- data/docs/resources/aws_iam_role.md.erb +69 -69
- data/docs/resources/aws_iam_root_user.md.erb +76 -76
- data/docs/resources/aws_iam_user.md.erb +120 -120
- data/docs/resources/aws_iam_users.md.erb +279 -279
- data/docs/resources/aws_kms_key.md.erb +177 -177
- data/docs/resources/aws_kms_keys.md.erb +89 -89
- data/docs/resources/aws_rds_instance.md.erb +66 -66
- data/docs/resources/aws_route_table.md.erb +53 -53
- data/docs/resources/aws_route_tables.md.erb +55 -55
- data/docs/resources/aws_s3_bucket.md.erb +146 -146
- data/docs/resources/aws_s3_bucket_object.md.erb +89 -89
- data/docs/resources/aws_s3_buckets.md.erb +59 -59
- data/docs/resources/aws_security_group.md.erb +296 -296
- data/docs/resources/aws_security_groups.md.erb +97 -97
- data/docs/resources/aws_sns_subscription.md.erb +130 -130
- data/docs/resources/aws_sns_topic.md.erb +69 -69
- data/docs/resources/aws_sns_topics.md.erb +58 -58
- data/docs/resources/aws_subnet.md.erb +140 -140
- data/docs/resources/aws_subnets.md.erb +132 -132
- data/docs/resources/aws_vpc.md.erb +125 -125
- data/docs/resources/aws_vpcs.md.erb +125 -125
- data/docs/resources/azure_generic_resource.md.erb +171 -171
- data/docs/resources/azure_resource_group.md.erb +284 -284
- data/docs/resources/azure_virtual_machine.md.erb +347 -347
- data/docs/resources/azure_virtual_machine_data_disk.md.erb +224 -224
- data/docs/resources/bash.md.erb +75 -75
- data/docs/resources/bond.md.erb +90 -90
- data/docs/resources/bridge.md.erb +57 -57
- data/docs/resources/bsd_service.md.erb +67 -67
- data/docs/resources/chocolatey_package.md.erb +58 -58
- data/docs/resources/command.md.erb +138 -138
- data/docs/resources/cpan.md.erb +79 -79
- data/docs/resources/cran.md.erb +64 -64
- data/docs/resources/crontab.md.erb +89 -89
- data/docs/resources/csv.md.erb +54 -54
- data/docs/resources/dh_params.md.erb +205 -205
- data/docs/resources/directory.md.erb +30 -30
- data/docs/resources/docker.md.erb +219 -219
- data/docs/resources/docker_container.md.erb +103 -103
- data/docs/resources/docker_image.md.erb +94 -94
- data/docs/resources/docker_service.md.erb +114 -114
- data/docs/resources/elasticsearch.md.erb +242 -242
- data/docs/resources/etc_fstab.md.erb +125 -125
- data/docs/resources/etc_group.md.erb +75 -75
- data/docs/resources/etc_hosts.md.erb +78 -78
- data/docs/resources/etc_hosts_allow.md.erb +74 -74
- data/docs/resources/etc_hosts_deny.md.erb +74 -74
- data/docs/resources/file.md.erb +526 -526
- data/docs/resources/filesystem.md.erb +41 -41
- data/docs/resources/firewalld.md.erb +107 -107
- data/docs/resources/gem.md.erb +79 -79
- data/docs/resources/group.md.erb +61 -61
- data/docs/resources/grub_conf.md.erb +101 -101
- data/docs/resources/host.md.erb +86 -86
- data/docs/resources/http.md.erb +197 -197
- data/docs/resources/iis_app.md.erb +122 -122
- data/docs/resources/iis_site.md.erb +135 -135
- data/docs/resources/inetd_conf.md.erb +94 -94
- data/docs/resources/ini.md.erb +76 -76
- data/docs/resources/interface.md.erb +58 -58
- data/docs/resources/iptables.md.erb +64 -64
- data/docs/resources/json.md.erb +63 -63
- data/docs/resources/kernel_module.md.erb +120 -120
- data/docs/resources/kernel_parameter.md.erb +53 -53
- data/docs/resources/key_rsa.md.erb +85 -85
- data/docs/resources/launchd_service.md.erb +57 -57
- data/docs/resources/limits_conf.md.erb +75 -75
- data/docs/resources/login_defs.md.erb +71 -71
- data/docs/resources/mount.md.erb +69 -69
- data/docs/resources/mssql_session.md.erb +60 -60
- data/docs/resources/mysql_conf.md.erb +99 -99
- data/docs/resources/mysql_session.md.erb +74 -74
- data/docs/resources/nginx.md.erb +79 -79
- data/docs/resources/nginx_conf.md.erb +138 -138
- data/docs/resources/npm.md.erb +60 -60
- data/docs/resources/ntp_conf.md.erb +60 -60
- data/docs/resources/oneget.md.erb +53 -53
- data/docs/resources/oracledb_session.md.erb +52 -52
- data/docs/resources/os.md.erb +141 -141
- data/docs/resources/os_env.md.erb +91 -91
- data/docs/resources/package.md.erb +120 -120
- data/docs/resources/packages.md.erb +67 -67
- data/docs/resources/parse_config.md.erb +103 -103
- data/docs/resources/parse_config_file.md.erb +138 -138
- data/docs/resources/passwd.md.erb +141 -141
- data/docs/resources/pip.md.erb +67 -67
- data/docs/resources/port.md.erb +137 -137
- data/docs/resources/postgres_conf.md.erb +79 -79
- data/docs/resources/postgres_hba_conf.md.erb +93 -93
- data/docs/resources/postgres_ident_conf.md.erb +76 -76
- data/docs/resources/postgres_session.md.erb +69 -69
- data/docs/resources/powershell.md.erb +102 -102
- data/docs/resources/processes.md.erb +109 -109
- data/docs/resources/rabbitmq_config.md.erb +41 -41
- data/docs/resources/registry_key.md.erb +158 -158
- data/docs/resources/runit_service.md.erb +57 -57
- data/docs/resources/security_policy.md.erb +47 -47
- data/docs/resources/service.md.erb +121 -121
- data/docs/resources/shadow.md.erb +146 -146
- data/docs/resources/ssh_config.md.erb +73 -73
- data/docs/resources/sshd_config.md.erb +83 -83
- data/docs/resources/ssl.md.erb +119 -119
- data/docs/resources/sys_info.md.erb +42 -42
- data/docs/resources/systemd_service.md.erb +57 -57
- data/docs/resources/sysv_service.md.erb +57 -57
- data/docs/resources/upstart_service.md.erb +57 -57
- data/docs/resources/user.md.erb +140 -140
- data/docs/resources/users.md.erb +127 -127
- data/docs/resources/vbscript.md.erb +55 -55
- data/docs/resources/virtualization.md.erb +57 -57
- data/docs/resources/windows_feature.md.erb +47 -47
- data/docs/resources/windows_hotfix.md.erb +53 -53
- data/docs/resources/windows_task.md.erb +95 -95
- data/docs/resources/wmi.md.erb +81 -81
- data/docs/resources/x509_certificate.md.erb +151 -151
- data/docs/resources/xinetd_conf.md.erb +156 -156
- data/docs/resources/xml.md.erb +85 -85
- data/docs/resources/yaml.md.erb +69 -69
- data/docs/resources/yum.md.erb +98 -98
- data/docs/resources/zfs_dataset.md.erb +53 -53
- data/docs/resources/zfs_pool.md.erb +47 -47
- data/docs/ruby_usage.md +203 -203
- data/docs/shared/matcher_be.md.erb +1 -1
- data/docs/shared/matcher_cmp.md.erb +43 -43
- data/docs/shared/matcher_eq.md.erb +3 -3
- data/docs/shared/matcher_include.md.erb +1 -1
- data/docs/shared/matcher_match.md.erb +1 -1
- data/docs/shell.md +217 -217
- data/examples/README.md +8 -8
- data/examples/inheritance/README.md +65 -65
- data/examples/inheritance/controls/example.rb +14 -14
- data/examples/inheritance/inspec.yml +15 -15
- data/examples/kitchen-ansible/.kitchen.yml +25 -25
- data/examples/kitchen-ansible/Gemfile +19 -19
- data/examples/kitchen-ansible/README.md +53 -53
- data/examples/kitchen-ansible/files/nginx.repo +6 -6
- data/examples/kitchen-ansible/tasks/main.yml +16 -16
- data/examples/kitchen-ansible/test/integration/default/default.yml +5 -5
- data/examples/kitchen-ansible/test/integration/default/web_spec.rb +28 -28
- data/examples/kitchen-chef/.kitchen.yml +20 -20
- data/examples/kitchen-chef/Berksfile +3 -3
- data/examples/kitchen-chef/Gemfile +19 -19
- data/examples/kitchen-chef/README.md +27 -27
- data/examples/kitchen-chef/metadata.rb +7 -7
- data/examples/kitchen-chef/recipes/default.rb +6 -6
- data/examples/kitchen-chef/recipes/nginx.rb +30 -30
- data/examples/kitchen-chef/test/integration/default/web_spec.rb +28 -28
- data/examples/kitchen-puppet/.kitchen.yml +23 -23
- data/examples/kitchen-puppet/Gemfile +20 -20
- data/examples/kitchen-puppet/Puppetfile +25 -25
- data/examples/kitchen-puppet/README.md +53 -53
- data/examples/kitchen-puppet/manifests/site.pp +33 -33
- data/examples/kitchen-puppet/metadata.json +11 -11
- data/examples/kitchen-puppet/test/integration/default/web_spec.rb +28 -28
- data/examples/meta-profile/README.md +37 -37
- data/examples/meta-profile/controls/example.rb +13 -13
- data/examples/meta-profile/inspec.yml +13 -13
- data/examples/profile-attribute.yml +2 -2
- data/examples/profile-attribute/README.md +14 -14
- data/examples/profile-attribute/controls/example.rb +11 -11
- data/examples/profile-attribute/inspec.yml +8 -8
- data/examples/profile-aws/controls/iam_password_policy_expiration.rb +8 -8
- data/examples/profile-aws/controls/iam_password_policy_max_age.rb +8 -8
- data/examples/profile-aws/controls/iam_root_user_mfa.rb +8 -8
- data/examples/profile-aws/controls/iam_users_access_key_age.rb +8 -8
- data/examples/profile-aws/controls/iam_users_console_users_mfa.rb +8 -8
- data/examples/profile-aws/inspec.yml +11 -11
- data/examples/profile-azure/controls/azure_resource_group_example.rb +24 -24
- data/examples/profile-azure/controls/azure_vm_example.rb +29 -29
- data/examples/profile-azure/inspec.yml +11 -11
- data/examples/profile-sensitive/README.md +29 -29
- data/examples/profile-sensitive/controls/sensitive-failures.rb +9 -9
- data/examples/profile-sensitive/controls/sensitive.rb +9 -9
- data/examples/profile-sensitive/inspec.yml +8 -8
- data/examples/profile/README.md +48 -48
- data/examples/profile/controls/example.rb +23 -23
- data/examples/profile/controls/gordon.rb +36 -36
- data/examples/profile/controls/meta.rb +34 -34
- data/examples/profile/inspec.yml +10 -10
- data/examples/profile/libraries/gordon_config.rb +59 -59
- data/inspec.gemspec +49 -49
- data/lib/bundles/README.md +3 -3
- data/lib/bundles/inspec-artifact.rb +7 -7
- data/lib/bundles/inspec-artifact/README.md +1 -1
- data/lib/bundles/inspec-artifact/cli.rb +277 -277
- data/lib/bundles/inspec-compliance.rb +16 -16
- data/lib/bundles/inspec-compliance/.kitchen.yml +20 -20
- data/lib/bundles/inspec-compliance/README.md +193 -193
- data/lib/bundles/inspec-compliance/api.rb +360 -360
- data/lib/bundles/inspec-compliance/api/login.rb +193 -193
- data/lib/bundles/inspec-compliance/bootstrap.sh +41 -41
- data/lib/bundles/inspec-compliance/cli.rb +260 -260
- data/lib/bundles/inspec-compliance/configuration.rb +103 -103
- data/lib/bundles/inspec-compliance/http.rb +125 -125
- data/lib/bundles/inspec-compliance/support.rb +36 -36
- data/lib/bundles/inspec-compliance/target.rb +112 -112
- data/lib/bundles/inspec-compliance/test/integration/default/cli.rb +93 -93
- data/lib/bundles/inspec-habitat.rb +12 -12
- data/lib/bundles/inspec-habitat/cli.rb +36 -36
- data/lib/bundles/inspec-habitat/log.rb +10 -10
- data/lib/bundles/inspec-habitat/profile.rb +391 -391
- data/lib/bundles/inspec-init.rb +8 -8
- data/lib/bundles/inspec-init/README.md +31 -31
- data/lib/bundles/inspec-init/cli.rb +97 -97
- data/lib/bundles/inspec-init/templates/profile/README.md +3 -3
- data/lib/bundles/inspec-init/templates/profile/controls/example.rb +19 -19
- data/lib/bundles/inspec-init/templates/profile/inspec.yml +8 -8
- data/lib/bundles/inspec-supermarket.rb +13 -13
- data/lib/bundles/inspec-supermarket/README.md +45 -45
- data/lib/bundles/inspec-supermarket/api.rb +84 -84
- data/lib/bundles/inspec-supermarket/cli.rb +73 -73
- data/lib/bundles/inspec-supermarket/target.rb +34 -34
- data/lib/fetchers/git.rb +163 -163
- data/lib/fetchers/local.rb +74 -74
- data/lib/fetchers/mock.rb +35 -35
- data/lib/fetchers/url.rb +247 -247
- data/lib/inspec.rb +24 -24
- data/lib/inspec/archive/tar.rb +29 -29
- data/lib/inspec/archive/zip.rb +19 -19
- data/lib/inspec/backend.rb +93 -93
- data/lib/inspec/base_cli.rb +368 -368
- data/lib/inspec/cached_fetcher.rb +66 -66
- data/lib/inspec/cli.rb +292 -292
- data/lib/inspec/completions/bash.sh.erb +45 -45
- data/lib/inspec/completions/fish.sh.erb +34 -34
- data/lib/inspec/completions/zsh.sh.erb +61 -61
- data/lib/inspec/control_eval_context.rb +179 -179
- data/lib/inspec/dependencies/cache.rb +72 -72
- data/lib/inspec/dependencies/dependency_set.rb +92 -92
- data/lib/inspec/dependencies/lockfile.rb +115 -115
- data/lib/inspec/dependencies/requirement.rb +123 -123
- data/lib/inspec/dependencies/resolver.rb +86 -86
- data/lib/inspec/describe.rb +27 -27
- data/lib/inspec/dsl.rb +66 -66
- data/lib/inspec/dsl_shared.rb +33 -33
- data/lib/inspec/env_printer.rb +157 -157
- data/lib/inspec/errors.rb +14 -14
- data/lib/inspec/exceptions.rb +12 -12
- data/lib/inspec/expect.rb +45 -45
- data/lib/inspec/fetcher.rb +45 -45
- data/lib/inspec/file_provider.rb +275 -275
- data/lib/inspec/formatters.rb +3 -3
- data/lib/inspec/formatters/base.rb +259 -259
- data/lib/inspec/formatters/json_rspec.rb +20 -20
- data/lib/inspec/formatters/show_progress.rb +12 -12
- data/lib/inspec/library_eval_context.rb +58 -58
- data/lib/inspec/log.rb +11 -11
- data/lib/inspec/metadata.rb +247 -247
- data/lib/inspec/method_source.rb +24 -24
- data/lib/inspec/objects.rb +14 -14
- data/lib/inspec/objects/attribute.rb +75 -75
- data/lib/inspec/objects/control.rb +61 -61
- data/lib/inspec/objects/describe.rb +92 -92
- data/lib/inspec/objects/each_loop.rb +36 -36
- data/lib/inspec/objects/list.rb +15 -15
- data/lib/inspec/objects/or_test.rb +40 -40
- data/lib/inspec/objects/ruby_helper.rb +15 -15
- data/lib/inspec/objects/tag.rb +27 -27
- data/lib/inspec/objects/test.rb +87 -87
- data/lib/inspec/objects/value.rb +27 -27
- data/lib/inspec/plugins.rb +60 -60
- data/lib/inspec/plugins/cli.rb +24 -24
- data/lib/inspec/plugins/fetcher.rb +86 -86
- data/lib/inspec/plugins/resource.rb +135 -135
- data/lib/inspec/plugins/secret.rb +15 -15
- data/lib/inspec/plugins/source_reader.rb +40 -40
- data/lib/inspec/polyfill.rb +12 -12
- data/lib/inspec/profile.rb +513 -513
- data/lib/inspec/profile_context.rb +208 -208
- data/lib/inspec/profile_vendor.rb +66 -66
- data/lib/inspec/reporters.rb +60 -60
- data/lib/inspec/reporters/automate.rb +76 -76
- data/lib/inspec/reporters/base.rb +25 -25
- data/lib/inspec/reporters/cli.rb +356 -356
- data/lib/inspec/reporters/json.rb +117 -117
- data/lib/inspec/reporters/json_min.rb +48 -48
- data/lib/inspec/reporters/junit.rb +78 -78
- data/lib/inspec/require_loader.rb +33 -33
- data/lib/inspec/resource.rb +190 -190
- data/lib/inspec/rule.rb +280 -280
- data/lib/inspec/runner.rb +345 -345
- data/lib/inspec/runner_mock.rb +41 -41
- data/lib/inspec/runner_rspec.rb +175 -175
- data/lib/inspec/runtime_profile.rb +26 -26
- data/lib/inspec/schema.rb +213 -213
- data/lib/inspec/secrets.rb +19 -19
- data/lib/inspec/secrets/yaml.rb +30 -30
- data/lib/inspec/shell.rb +220 -220
- data/lib/inspec/shell_detector.rb +90 -90
- data/lib/inspec/source_reader.rb +29 -29
- data/lib/inspec/version.rb +8 -8
- data/lib/matchers/matchers.rb +339 -339
- data/lib/resource_support/aws.rb +50 -50
- data/lib/resource_support/aws/aws_backend_base.rb +12 -12
- data/lib/resource_support/aws/aws_backend_factory_mixin.rb +12 -12
- data/lib/resource_support/aws/aws_plural_resource_mixin.rb +21 -21
- data/lib/resource_support/aws/aws_resource_mixin.rb +66 -66
- data/lib/resource_support/aws/aws_singular_resource_mixin.rb +24 -24
- data/lib/resources/aide_conf.rb +151 -151
- data/lib/resources/apache.rb +48 -48
- data/lib/resources/apache_conf.rb +149 -149
- data/lib/resources/apt.rb +149 -149
- data/lib/resources/audit_policy.rb +63 -63
- data/lib/resources/auditd.rb +231 -231
- data/lib/resources/auditd_conf.rb +46 -46
- data/lib/resources/aws/aws_cloudtrail_trail.rb +93 -93
- data/lib/resources/aws/aws_cloudtrail_trails.rb +47 -47
- data/lib/resources/aws/aws_cloudwatch_alarm.rb +62 -62
- data/lib/resources/aws/aws_cloudwatch_log_metric_filter.rb +100 -100
- data/lib/resources/aws/aws_config_delivery_channel.rb +70 -70
- data/lib/resources/aws/aws_config_recorder.rb +93 -93
- data/lib/resources/aws/aws_ec2_instance.rb +157 -157
- data/lib/resources/aws/aws_ec2_instances.rb +64 -64
- data/lib/resources/aws/aws_iam_access_key.rb +106 -106
- data/lib/resources/aws/aws_iam_access_keys.rb +149 -149
- data/lib/resources/aws/aws_iam_group.rb +58 -58
- data/lib/resources/aws/aws_iam_groups.rb +52 -52
- data/lib/resources/aws/aws_iam_password_policy.rb +116 -116
- data/lib/resources/aws/aws_iam_policies.rb +53 -53
- data/lib/resources/aws/aws_iam_policy.rb +291 -291
- data/lib/resources/aws/aws_iam_role.rb +55 -55
- data/lib/resources/aws/aws_iam_root_user.rb +78 -78
- data/lib/resources/aws/aws_iam_user.rb +142 -142
- data/lib/resources/aws/aws_iam_users.rb +146 -146
- data/lib/resources/aws/aws_kms_key.rb +96 -96
- data/lib/resources/aws/aws_kms_keys.rb +53 -53
- data/lib/resources/aws/aws_rds_instance.rb +71 -71
- data/lib/resources/aws/aws_route_table.rb +63 -63
- data/lib/resources/aws/aws_route_tables.rb +60 -60
- data/lib/resources/aws/aws_s3_bucket.rb +137 -137
- data/lib/resources/aws/aws_s3_bucket_object.rb +82 -82
- data/lib/resources/aws/aws_s3_buckets.rb +51 -51
- data/lib/resources/aws/aws_security_group.rb +249 -249
- data/lib/resources/aws/aws_security_groups.rb +68 -68
- data/lib/resources/aws/aws_sns_subscription.rb +78 -78
- data/lib/resources/aws/aws_sns_topic.rb +53 -53
- data/lib/resources/aws/aws_sns_topics.rb +56 -56
- data/lib/resources/aws/aws_subnet.rb +88 -88
- data/lib/resources/aws/aws_subnets.rb +53 -53
- data/lib/resources/aws/aws_vpc.rb +73 -73
- data/lib/resources/aws/aws_vpcs.rb +52 -52
- data/lib/resources/azure/azure_backend.rb +377 -377
- data/lib/resources/azure/azure_generic_resource.rb +59 -59
- data/lib/resources/azure/azure_resource_group.rb +152 -152
- data/lib/resources/azure/azure_virtual_machine.rb +264 -264
- data/lib/resources/azure/azure_virtual_machine_data_disk.rb +134 -134
- data/lib/resources/bash.rb +35 -35
- data/lib/resources/bond.rb +69 -69
- data/lib/resources/bridge.rb +122 -122
- data/lib/resources/chocolatey_package.rb +78 -78
- data/lib/resources/command.rb +73 -73
- data/lib/resources/cpan.rb +58 -58
- data/lib/resources/cran.rb +64 -64
- data/lib/resources/crontab.rb +169 -169
- data/lib/resources/csv.rb +56 -56
- data/lib/resources/dh_params.rb +77 -77
- data/lib/resources/directory.rb +25 -25
- data/lib/resources/docker.rb +236 -236
- data/lib/resources/docker_container.rb +89 -89
- data/lib/resources/docker_image.rb +83 -83
- data/lib/resources/docker_object.rb +57 -57
- data/lib/resources/docker_service.rb +90 -90
- data/lib/resources/elasticsearch.rb +169 -169
- data/lib/resources/etc_fstab.rb +94 -94
- data/lib/resources/etc_group.rb +154 -154
- data/lib/resources/etc_hosts.rb +66 -66
- data/lib/resources/etc_hosts_allow_deny.rb +112 -112
- data/lib/resources/file.rb +298 -298
- data/lib/resources/filesystem.rb +31 -31
- data/lib/resources/firewalld.rb +143 -143
- data/lib/resources/gem.rb +70 -70
- data/lib/resources/groups.rb +215 -215
- data/lib/resources/grub_conf.rb +227 -227
- data/lib/resources/host.rb +306 -306
- data/lib/resources/http.rb +253 -253
- data/lib/resources/iis_app.rb +101 -101
- data/lib/resources/iis_site.rb +148 -148
- data/lib/resources/inetd_conf.rb +54 -54
- data/lib/resources/ini.rb +29 -29
- data/lib/resources/interface.rb +129 -129
- data/lib/resources/iptables.rb +80 -80
- data/lib/resources/json.rb +111 -111
- data/lib/resources/kernel_module.rb +107 -107
- data/lib/resources/kernel_parameter.rb +58 -58
- data/lib/resources/key_rsa.rb +63 -63
- data/lib/resources/limits_conf.rb +46 -46
- data/lib/resources/login_def.rb +57 -57
- data/lib/resources/mount.rb +88 -88
- data/lib/resources/mssql_session.rb +101 -101
- data/lib/resources/mysql.rb +82 -82
- data/lib/resources/mysql_conf.rb +127 -127
- data/lib/resources/mysql_session.rb +85 -85
- data/lib/resources/nginx.rb +96 -96
- data/lib/resources/nginx_conf.rb +226 -226
- data/lib/resources/npm.rb +48 -48
- data/lib/resources/ntp_conf.rb +51 -51
- data/lib/resources/oneget.rb +71 -71
- data/lib/resources/oracledb_session.rb +139 -139
- data/lib/resources/os.rb +36 -36
- data/lib/resources/os_env.rb +86 -86
- data/lib/resources/package.rb +370 -370
- data/lib/resources/packages.rb +111 -111
- data/lib/resources/parse_config.rb +112 -112
- data/lib/resources/passwd.rb +76 -76
- data/lib/resources/pip.rb +130 -130
- data/lib/resources/platform.rb +109 -109
- data/lib/resources/port.rb +771 -771
- data/lib/resources/postgres.rb +131 -131
- data/lib/resources/postgres_conf.rb +114 -114
- data/lib/resources/postgres_hba_conf.rb +90 -90
- data/lib/resources/postgres_ident_conf.rb +79 -79
- data/lib/resources/postgres_session.rb +71 -71
- data/lib/resources/powershell.rb +67 -67
- data/lib/resources/processes.rb +204 -204
- data/lib/resources/rabbitmq_conf.rb +51 -51
- data/lib/resources/registry_key.rb +297 -297
- data/lib/resources/security_policy.rb +180 -180
- data/lib/resources/service.rb +794 -794
- data/lib/resources/shadow.rb +159 -159
- data/lib/resources/ssh_conf.rb +97 -97
- data/lib/resources/ssl.rb +99 -99
- data/lib/resources/sys_info.rb +28 -28
- data/lib/resources/toml.rb +32 -32
- data/lib/resources/users.rb +654 -654
- data/lib/resources/vbscript.rb +68 -68
- data/lib/resources/virtualization.rb +247 -247
- data/lib/resources/windows_feature.rb +84 -84
- data/lib/resources/windows_hotfix.rb +35 -35
- data/lib/resources/windows_task.rb +102 -102
- data/lib/resources/wmi.rb +110 -110
- data/lib/resources/x509_certificate.rb +137 -137
- data/lib/resources/xinetd.rb +106 -106
- data/lib/resources/xml.rb +46 -46
- data/lib/resources/yaml.rb +43 -43
- data/lib/resources/yum.rb +180 -180
- data/lib/resources/zfs_dataset.rb +60 -60
- data/lib/resources/zfs_pool.rb +49 -49
- data/lib/source_readers/flat.rb +39 -39
- data/lib/source_readers/inspec.rb +75 -75
- data/lib/utils/command_wrapper.rb +27 -27
- data/lib/utils/convert.rb +12 -12
- data/lib/utils/database_helpers.rb +77 -77
- data/lib/utils/enumerable_delegation.rb +9 -9
- data/lib/utils/erlang_parser.rb +192 -192
- data/lib/utils/file_reader.rb +25 -25
- data/lib/utils/filter.rb +273 -273
- data/lib/utils/filter_array.rb +27 -27
- data/lib/utils/find_files.rb +47 -47
- data/lib/utils/hash.rb +41 -41
- data/lib/utils/json_log.rb +18 -18
- data/lib/utils/latest_version.rb +22 -22
- data/lib/utils/modulator.rb +12 -12
- data/lib/utils/nginx_parser.rb +105 -105
- data/lib/utils/object_traversal.rb +49 -49
- data/lib/utils/parser.rb +274 -274
- data/lib/utils/pkey_reader.rb +15 -15
- data/lib/utils/plugin_registry.rb +93 -93
- data/lib/utils/simpleconfig.rb +120 -120
- data/lib/utils/spdx.rb +13 -13
- data/lib/utils/spdx.txt +343 -343
- metadata +3 -3
@@ -1,79 +1,79 @@
|
|
1
|
-
---
|
2
|
-
title: About the aws_ec2_instances Resource
|
3
|
-
platform: aws
|
4
|
-
---
|
5
|
-
|
6
|
-
# aws\_ec2\_instances
|
7
|
-
|
8
|
-
Use the `aws_ec2_instances` InSpec audit resource to test properties of some or all AWS EC2 instances. To audit a single EC2 instance, use `aws_ec2_instance` (singular).
|
9
|
-
|
10
|
-
EC2 instances are the basic unit of computing within AWS. An instance is a virtual machine that contains a running OS, and may be created or destroyed by code.
|
11
|
-
|
12
|
-
Each EC2 instance is uniquely identified by its ID.
|
13
|
-
|
14
|
-
<br>
|
15
|
-
|
16
|
-
## Syntax
|
17
|
-
|
18
|
-
An `aws_ec2_instances` resource block collects a group of EC2 Instances and then tests that group.
|
19
|
-
|
20
|
-
# Ensure you have exactly 3 instances
|
21
|
-
describe aws_ec2_instances do
|
22
|
-
its('instance_ids.count') { should cmp 3 }
|
23
|
-
end
|
24
|
-
|
25
|
-
# Use the InSpec resource to enumerate IDs, then test in-depth using `aws_ec2_instance`.
|
26
|
-
aws_ec2_instances.instance_ids.each do |instance_id|
|
27
|
-
describe aws_ec2_instance(instance_id) do
|
28
|
-
its('key_name') { should cmp 'admin-ssh-key' }
|
29
|
-
end
|
30
|
-
end
|
31
|
-
|
32
|
-
<br>
|
33
|
-
|
34
|
-
## Examples
|
35
|
-
|
36
|
-
As this is the initial release of `aws_ec2_instances`, its limited functionality precludes examples.
|
37
|
-
|
38
|
-
<br>
|
39
|
-
|
40
|
-
## Filter Criteria
|
41
|
-
|
42
|
-
This resource currently does not support any filter criteria; it will always fetch all instances in the region.
|
43
|
-
|
44
|
-
## Properties
|
45
|
-
|
46
|
-
### entries
|
47
|
-
|
48
|
-
Provides access to the raw results of the query, which can be treated as an array of hashes. This can be useful for checking counts and other advanced operations.
|
49
|
-
|
50
|
-
# Allow at most 100 EC2 Instances on the account
|
51
|
-
describe aws_ec2_instances do
|
52
|
-
its('entries.count') { should be <= 100}
|
53
|
-
end
|
54
|
-
|
55
|
-
|
56
|
-
### instance_ids
|
57
|
-
|
58
|
-
Provides a list of the instance ids that were found in the query.
|
59
|
-
|
60
|
-
describe aws_ec2_instances do
|
61
|
-
its('instance_ids') { should include('i-12345678') }
|
62
|
-
its('instance_ids.count') { should cmp 3) }
|
63
|
-
end
|
64
|
-
|
65
|
-
<br>
|
66
|
-
|
67
|
-
## Matchers
|
68
|
-
|
69
|
-
For a full list of available matchers, please visit our [Universal Matchers page](https://www.inspec.io/docs/reference/matchers/).
|
70
|
-
|
71
|
-
### exist
|
72
|
-
|
73
|
-
The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
|
74
|
-
|
75
|
-
# Verify that at least one EC2 Instance exists.
|
76
|
-
describe aws_ec2_instances
|
77
|
-
it { should exist }
|
78
|
-
end
|
79
|
-
|
1
|
+
---
|
2
|
+
title: About the aws_ec2_instances Resource
|
3
|
+
platform: aws
|
4
|
+
---
|
5
|
+
|
6
|
+
# aws\_ec2\_instances
|
7
|
+
|
8
|
+
Use the `aws_ec2_instances` InSpec audit resource to test properties of some or all AWS EC2 instances. To audit a single EC2 instance, use `aws_ec2_instance` (singular).
|
9
|
+
|
10
|
+
EC2 instances are the basic unit of computing within AWS. An instance is a virtual machine that contains a running OS, and may be created or destroyed by code.
|
11
|
+
|
12
|
+
Each EC2 instance is uniquely identified by its ID.
|
13
|
+
|
14
|
+
<br>
|
15
|
+
|
16
|
+
## Syntax
|
17
|
+
|
18
|
+
An `aws_ec2_instances` resource block collects a group of EC2 Instances and then tests that group.
|
19
|
+
|
20
|
+
# Ensure you have exactly 3 instances
|
21
|
+
describe aws_ec2_instances do
|
22
|
+
its('instance_ids.count') { should cmp 3 }
|
23
|
+
end
|
24
|
+
|
25
|
+
# Use the InSpec resource to enumerate IDs, then test in-depth using `aws_ec2_instance`.
|
26
|
+
aws_ec2_instances.instance_ids.each do |instance_id|
|
27
|
+
describe aws_ec2_instance(instance_id) do
|
28
|
+
its('key_name') { should cmp 'admin-ssh-key' }
|
29
|
+
end
|
30
|
+
end
|
31
|
+
|
32
|
+
<br>
|
33
|
+
|
34
|
+
## Examples
|
35
|
+
|
36
|
+
As this is the initial release of `aws_ec2_instances`, its limited functionality precludes examples.
|
37
|
+
|
38
|
+
<br>
|
39
|
+
|
40
|
+
## Filter Criteria
|
41
|
+
|
42
|
+
This resource currently does not support any filter criteria; it will always fetch all instances in the region.
|
43
|
+
|
44
|
+
## Properties
|
45
|
+
|
46
|
+
### entries
|
47
|
+
|
48
|
+
Provides access to the raw results of the query, which can be treated as an array of hashes. This can be useful for checking counts and other advanced operations.
|
49
|
+
|
50
|
+
# Allow at most 100 EC2 Instances on the account
|
51
|
+
describe aws_ec2_instances do
|
52
|
+
its('entries.count') { should be <= 100}
|
53
|
+
end
|
54
|
+
|
55
|
+
|
56
|
+
### instance_ids
|
57
|
+
|
58
|
+
Provides a list of the instance ids that were found in the query.
|
59
|
+
|
60
|
+
describe aws_ec2_instances do
|
61
|
+
its('instance_ids') { should include('i-12345678') }
|
62
|
+
its('instance_ids.count') { should cmp 3) }
|
63
|
+
end
|
64
|
+
|
65
|
+
<br>
|
66
|
+
|
67
|
+
## Matchers
|
68
|
+
|
69
|
+
For a full list of available matchers, please visit our [Universal Matchers page](https://www.inspec.io/docs/reference/matchers/).
|
70
|
+
|
71
|
+
### exist
|
72
|
+
|
73
|
+
The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
|
74
|
+
|
75
|
+
# Verify that at least one EC2 Instance exists.
|
76
|
+
describe aws_ec2_instances
|
77
|
+
it { should exist }
|
78
|
+
end
|
79
|
+
|
@@ -1,129 +1,129 @@
|
|
1
|
-
---
|
2
|
-
title: About the aws_iam_access_key Resource
|
3
|
-
platform: aws
|
4
|
-
---
|
5
|
-
|
6
|
-
# aws\_iam\_access\_key
|
7
|
-
|
8
|
-
Use the `aws_iam_access_key` InSpec audit resource to test properties of a single AWS IAM access key.
|
9
|
-
|
10
|
-
<br>
|
11
|
-
|
12
|
-
## Syntax
|
13
|
-
|
14
|
-
An `aws_iam_access_key` resource block declares the tests for a single AWS IAM access key. An access key is uniquely identified by its access key id.
|
15
|
-
|
16
|
-
# This is unique - the key will either exist or it won't, but it will never be an error.
|
17
|
-
describe aws_iam_access_key(access_key_id: 'AKIA12345678ABCD') do
|
18
|
-
it { should exist }
|
19
|
-
it { should_not be_active }
|
20
|
-
its('create_date') { should be > Time.now - 365 * 86400 }
|
21
|
-
its('last_used_date') { should be > Time.now - 90 * 86400 }
|
22
|
-
end
|
23
|
-
|
24
|
-
# id is an alias for access_key_id
|
25
|
-
describe aws_iam_access_key(id: 'AKIA12345678ABCD') do
|
26
|
-
# Same
|
27
|
-
end
|
28
|
-
|
29
|
-
|
30
|
-
Access keys are associated with IAM users, who may have zero, one or two access keys. You may also lookup an access key by username. If the user has more than one access key, an error occurs (You may use `aws_iam_access_keys` with the `username` resource parameter to access a user's keys when they have multiple keys.)
|
31
|
-
|
32
|
-
# This is not unique. If the user has zero or one keys, it is not an error.
|
33
|
-
# If they have two, it is an error.
|
34
|
-
describe aws_iam_access_key(username: 'roderick') do
|
35
|
-
it { should exist }
|
36
|
-
it { should be_active }
|
37
|
-
end
|
38
|
-
|
39
|
-
You may also use both username and access key id to ensure that a particular key is associated with a particular user.
|
40
|
-
|
41
|
-
describe aws_iam_access_key(username: 'roderick', access_key_id: 'AKIA12345678ABCD') do
|
42
|
-
it { should exist }
|
43
|
-
end
|
44
|
-
|
45
|
-
<br>
|
46
|
-
|
47
|
-
## Examples
|
48
|
-
|
49
|
-
The following examples show how to use this InSpec audit resource.
|
50
|
-
|
51
|
-
### Test that an IAM access key is not active
|
52
|
-
|
53
|
-
describe aws_iam_access_key(username: 'username', id: 'access-key-id') do
|
54
|
-
it { should_not be_active }
|
55
|
-
end
|
56
|
-
|
57
|
-
### Test that an IAM access key is older than one year
|
58
|
-
|
59
|
-
describe aws_iam_access_key(username: 'username', id: 'access-key-id') do
|
60
|
-
its('create_date') { should be > Time.now - 365 * 86400 }
|
61
|
-
end
|
62
|
-
|
63
|
-
### Test that an IAM access key has been used in the past 90 days
|
64
|
-
|
65
|
-
describe aws_iam_access_key(username: 'username', id: 'access-key-id') do
|
66
|
-
its('last_used_date') { should be > Time.now - 90 * 86400 }
|
67
|
-
end
|
68
|
-
|
69
|
-
<br>
|
70
|
-
|
71
|
-
## Properties
|
72
|
-
|
73
|
-
* `access_key_id`, `create_date`, `last_used_date`, `username`
|
74
|
-
|
75
|
-
<br>
|
76
|
-
|
77
|
-
## Property Examples
|
78
|
-
|
79
|
-
### access\_key\_id
|
80
|
-
|
81
|
-
The unique ID of this access key.
|
82
|
-
|
83
|
-
describe aws_iam_access_key(username: 'bob')
|
84
|
-
its('access_key_id') { should cmp 'AKIA12345678ABCD' }
|
85
|
-
end
|
86
|
-
|
87
|
-
### create\_date
|
88
|
-
|
89
|
-
The date and time, as a Ruby DateTime, at which the access key was created.
|
90
|
-
|
91
|
-
# Is the access key less than a year old?
|
92
|
-
describe aws_iam_access_key(username: 'bob')
|
93
|
-
its('create_date') { should be > Time.now - 365 * 86400 }
|
94
|
-
end
|
95
|
-
|
96
|
-
### last\_used\_date
|
97
|
-
|
98
|
-
The date and time, as a Ruby DateTime, at which the access key was last_used.
|
99
|
-
|
100
|
-
# Has the access key been used in the last year?
|
101
|
-
describe aws_iam_access_key(username: 'bob')
|
102
|
-
its('last_used_date') { should be > Time.now - 365 * 86400 }
|
103
|
-
end
|
104
|
-
|
105
|
-
### username
|
106
|
-
|
107
|
-
The IAM user that owns this key.
|
108
|
-
|
109
|
-
describe aws_iam_access_key(access_key_id: 'AKIA12345678ABCD')
|
110
|
-
its('username') { should cmp 'bob' }
|
111
|
-
end
|
112
|
-
|
113
|
-
<br>
|
114
|
-
|
115
|
-
## Matchers
|
116
|
-
|
117
|
-
This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
|
118
|
-
|
119
|
-
### be\_active
|
120
|
-
|
121
|
-
The `be_active` matcher tests if the described IAM access key is active.
|
122
|
-
|
123
|
-
it { should be_active }
|
124
|
-
|
125
|
-
## AWS Permissions
|
126
|
-
|
127
|
-
Your [Principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/intro-structure.html#intro-structure-principal) will need the `iam:ListAccessKeys` action with Effect set to Allow.
|
128
|
-
|
129
|
-
You can find detailed documentation at [Actions, Resources, and Condition Keys for Identity And Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/list_identityandaccessmanagement.html).
|
1
|
+
---
|
2
|
+
title: About the aws_iam_access_key Resource
|
3
|
+
platform: aws
|
4
|
+
---
|
5
|
+
|
6
|
+
# aws\_iam\_access\_key
|
7
|
+
|
8
|
+
Use the `aws_iam_access_key` InSpec audit resource to test properties of a single AWS IAM access key.
|
9
|
+
|
10
|
+
<br>
|
11
|
+
|
12
|
+
## Syntax
|
13
|
+
|
14
|
+
An `aws_iam_access_key` resource block declares the tests for a single AWS IAM access key. An access key is uniquely identified by its access key id.
|
15
|
+
|
16
|
+
# This is unique - the key will either exist or it won't, but it will never be an error.
|
17
|
+
describe aws_iam_access_key(access_key_id: 'AKIA12345678ABCD') do
|
18
|
+
it { should exist }
|
19
|
+
it { should_not be_active }
|
20
|
+
its('create_date') { should be > Time.now - 365 * 86400 }
|
21
|
+
its('last_used_date') { should be > Time.now - 90 * 86400 }
|
22
|
+
end
|
23
|
+
|
24
|
+
# id is an alias for access_key_id
|
25
|
+
describe aws_iam_access_key(id: 'AKIA12345678ABCD') do
|
26
|
+
# Same
|
27
|
+
end
|
28
|
+
|
29
|
+
|
30
|
+
Access keys are associated with IAM users, who may have zero, one or two access keys. You may also lookup an access key by username. If the user has more than one access key, an error occurs (You may use `aws_iam_access_keys` with the `username` resource parameter to access a user's keys when they have multiple keys.)
|
31
|
+
|
32
|
+
# This is not unique. If the user has zero or one keys, it is not an error.
|
33
|
+
# If they have two, it is an error.
|
34
|
+
describe aws_iam_access_key(username: 'roderick') do
|
35
|
+
it { should exist }
|
36
|
+
it { should be_active }
|
37
|
+
end
|
38
|
+
|
39
|
+
You may also use both username and access key id to ensure that a particular key is associated with a particular user.
|
40
|
+
|
41
|
+
describe aws_iam_access_key(username: 'roderick', access_key_id: 'AKIA12345678ABCD') do
|
42
|
+
it { should exist }
|
43
|
+
end
|
44
|
+
|
45
|
+
<br>
|
46
|
+
|
47
|
+
## Examples
|
48
|
+
|
49
|
+
The following examples show how to use this InSpec audit resource.
|
50
|
+
|
51
|
+
### Test that an IAM access key is not active
|
52
|
+
|
53
|
+
describe aws_iam_access_key(username: 'username', id: 'access-key-id') do
|
54
|
+
it { should_not be_active }
|
55
|
+
end
|
56
|
+
|
57
|
+
### Test that an IAM access key is older than one year
|
58
|
+
|
59
|
+
describe aws_iam_access_key(username: 'username', id: 'access-key-id') do
|
60
|
+
its('create_date') { should be > Time.now - 365 * 86400 }
|
61
|
+
end
|
62
|
+
|
63
|
+
### Test that an IAM access key has been used in the past 90 days
|
64
|
+
|
65
|
+
describe aws_iam_access_key(username: 'username', id: 'access-key-id') do
|
66
|
+
its('last_used_date') { should be > Time.now - 90 * 86400 }
|
67
|
+
end
|
68
|
+
|
69
|
+
<br>
|
70
|
+
|
71
|
+
## Properties
|
72
|
+
|
73
|
+
* `access_key_id`, `create_date`, `last_used_date`, `username`
|
74
|
+
|
75
|
+
<br>
|
76
|
+
|
77
|
+
## Property Examples
|
78
|
+
|
79
|
+
### access\_key\_id
|
80
|
+
|
81
|
+
The unique ID of this access key.
|
82
|
+
|
83
|
+
describe aws_iam_access_key(username: 'bob')
|
84
|
+
its('access_key_id') { should cmp 'AKIA12345678ABCD' }
|
85
|
+
end
|
86
|
+
|
87
|
+
### create\_date
|
88
|
+
|
89
|
+
The date and time, as a Ruby DateTime, at which the access key was created.
|
90
|
+
|
91
|
+
# Is the access key less than a year old?
|
92
|
+
describe aws_iam_access_key(username: 'bob')
|
93
|
+
its('create_date') { should be > Time.now - 365 * 86400 }
|
94
|
+
end
|
95
|
+
|
96
|
+
### last\_used\_date
|
97
|
+
|
98
|
+
The date and time, as a Ruby DateTime, at which the access key was last_used.
|
99
|
+
|
100
|
+
# Has the access key been used in the last year?
|
101
|
+
describe aws_iam_access_key(username: 'bob')
|
102
|
+
its('last_used_date') { should be > Time.now - 365 * 86400 }
|
103
|
+
end
|
104
|
+
|
105
|
+
### username
|
106
|
+
|
107
|
+
The IAM user that owns this key.
|
108
|
+
|
109
|
+
describe aws_iam_access_key(access_key_id: 'AKIA12345678ABCD')
|
110
|
+
its('username') { should cmp 'bob' }
|
111
|
+
end
|
112
|
+
|
113
|
+
<br>
|
114
|
+
|
115
|
+
## Matchers
|
116
|
+
|
117
|
+
This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
|
118
|
+
|
119
|
+
### be\_active
|
120
|
+
|
121
|
+
The `be_active` matcher tests if the described IAM access key is active.
|
122
|
+
|
123
|
+
it { should be_active }
|
124
|
+
|
125
|
+
## AWS Permissions
|
126
|
+
|
127
|
+
Your [Principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/intro-structure.html#intro-structure-principal) will need the `iam:ListAccessKeys` action with Effect set to Allow.
|
128
|
+
|
129
|
+
You can find detailed documentation at [Actions, Resources, and Condition Keys for Identity And Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/list_identityandaccessmanagement.html).
|
@@ -1,204 +1,204 @@
|
|
1
|
-
---
|
2
|
-
title: About the aws_iam_access_keys Resource
|
3
|
-
platform: aws
|
4
|
-
---
|
5
|
-
|
6
|
-
# aws\_iam\_access\_keys
|
7
|
-
|
8
|
-
Use the `aws_iam_access_keys` InSpec audit resource to test properties of some or all IAM Access Keys.
|
9
|
-
|
10
|
-
To test properties of a single Access Key, use the `aws_iam_access_key` resource instead.
|
11
|
-
To test properties of an individual user's access keys, use the `aws_iam_user` resource.
|
12
|
-
|
13
|
-
Access Keys are closely related to AWS User resources. Use this resource to perform audits of all keys or of keys specified by criteria unrelated to any particular user.
|
14
|
-
|
15
|
-
<br>
|
16
|
-
|
17
|
-
## Syntax
|
18
|
-
|
19
|
-
An `aws_iam_access_keys` resource block uses an optional filter to select a group of access keys and then tests that group.
|
20
|
-
|
21
|
-
# Do not allow any access keys
|
22
|
-
describe aws_iam_access_keys do
|
23
|
-
it { should_not exist }
|
24
|
-
end
|
25
|
-
|
26
|
-
# Don't let fred have access keys, using filter argument syntax
|
27
|
-
describe aws_iam_access_keys.where(username: 'fred') do
|
28
|
-
it { should_not exist }
|
29
|
-
end
|
30
|
-
|
31
|
-
# Don't let fred have access keys, using filter block syntax (most flexible)
|
32
|
-
describe aws_iam_access_keys.where { username == 'fred' } do
|
33
|
-
it { should_not exist }
|
34
|
-
end
|
35
|
-
|
36
|
-
<br>
|
37
|
-
|
38
|
-
## Examples
|
39
|
-
|
40
|
-
The following examples show how to use this InSpec audit resource.
|
41
|
-
|
42
|
-
### Disallow access keys created more than 90 days ago
|
43
|
-
|
44
|
-
describe aws_iam_access_keys.where { created_days_ago > 90 } do
|
45
|
-
it { should_not exist }
|
46
|
-
end
|
47
|
-
|
48
|
-
<br>
|
49
|
-
|
50
|
-
## Filter Criteria
|
51
|
-
* `active`, `create_date`, `created_days_ago`, `created_hours_ago`, `created_with_user`, `ever_used`, `inactive`, `last_used_date`, `last_used_hours_ago`, `last_used_days_ago`, `never_used`, `user_created_date`
|
52
|
-
|
53
|
-
<br>
|
54
|
-
|
55
|
-
## Filter Examples
|
56
|
-
|
57
|
-
### active
|
58
|
-
|
59
|
-
A true / false value indicating if an Access Key is currently "Active" (the normal state) in the AWS console. See also: `inactive`.
|
60
|
-
|
61
|
-
# Check if a particular key is enabled
|
62
|
-
describe aws_iam_access_keys.where { active } do
|
63
|
-
its('access_key_ids') { should include('AKIA1234567890ABCDEF')}
|
64
|
-
end
|
65
|
-
|
66
|
-
### create\_date
|
67
|
-
|
68
|
-
A DateTime identifying when the Access Key was created. See also `created_days_ago` and `created_hours_ago`.
|
69
|
-
|
70
|
-
# Detect keys older than 2017
|
71
|
-
describe aws_iam_access_keys.where { create_date < DateTime.parse('2017-01-01') } do
|
72
|
-
it { should_not exist }
|
73
|
-
end
|
74
|
-
|
75
|
-
### created\_days\_ago, created\_hours\_ago
|
76
|
-
|
77
|
-
An integer, representing how old the access key is.
|
78
|
-
|
79
|
-
# Don't allow keys that are older than 90 days
|
80
|
-
describe aws_iam_access_keys.where { created_days_ago > 90 } do
|
81
|
-
it { should_not exist }
|
82
|
-
end
|
83
|
-
|
84
|
-
### created\_with\_user
|
85
|
-
|
86
|
-
A true / false value indicating if the Access Key was likely created at the same time as the user, by checking if the difference between created_date and user_created_date is less than 1 hour.
|
87
|
-
|
88
|
-
# Do not automatically create keys for users
|
89
|
-
describe aws_iam_access_keys.where { created_with_user } do
|
90
|
-
it { should_not exist }
|
91
|
-
end
|
92
|
-
|
93
|
-
### ever\_used
|
94
|
-
|
95
|
-
A true / false value indicating if the Access Key has ever been used, based on the last_used_date. See also: `never_used`.
|
96
|
-
|
97
|
-
# Check to see if a particular key has ever been used
|
98
|
-
describe aws_iam_access_keys.where { ever_used } do
|
99
|
-
its('access_key_ids') { should include('AKIA1234567890ABCDEF')}
|
100
|
-
end
|
101
|
-
|
102
|
-
### inactive
|
103
|
-
|
104
|
-
A true / false value indicating if the Access Key has been marked Inactive in the AWS console. See also: `active`.
|
105
|
-
|
106
|
-
# Don't leave inactive keys laying around
|
107
|
-
describe aws_iam_access_keys.where { inactive } do
|
108
|
-
it { should_not exist }
|
109
|
-
end
|
110
|
-
|
111
|
-
### last\_used\_date
|
112
|
-
|
113
|
-
A DateTime identifying when the Access Key was last used. Returns nil if the key has never been used. See also: `ever_used`, `last_used_days_ago`, `last_used_hours_ago`, and `never_used`.
|
114
|
-
|
115
|
-
# No one should do anything on Mondays
|
116
|
-
describe aws_iam_access_keys.where { ever_used and last_used_date.monday? } do
|
117
|
-
it { should_not exist }
|
118
|
-
end
|
119
|
-
|
120
|
-
### last\_used\_days\_ago, last\_used\_hours\_ago
|
121
|
-
|
122
|
-
An integer representing when the key was last used. See also: `ever_used`, `last_used_date`, and `never_used`.
|
123
|
-
|
124
|
-
# Don't allow keys that sit unused for more than 90 days
|
125
|
-
describe aws_iam_access_keys.where { last_used_days_ago > 90 } do
|
126
|
-
it { should_not exist }
|
127
|
-
end
|
128
|
-
|
129
|
-
### never\_used
|
130
|
-
|
131
|
-
A true / false value indicating if the Access Key has never been used, based on the `last_used_date`. See also: `ever_used`.
|
132
|
-
|
133
|
-
# Don't allow unused keys to lay around
|
134
|
-
describe aws_iam_access_keys.where { never_used } do
|
135
|
-
it { should_not exist }
|
136
|
-
end
|
137
|
-
|
138
|
-
### username
|
139
|
-
|
140
|
-
Searches for access keys owned by the named user. Each user may have zero, one, or two access keys.
|
141
|
-
|
142
|
-
describe aws_iam_access_keys(username: 'bob') do
|
143
|
-
it { should exist }
|
144
|
-
end
|
145
|
-
|
146
|
-
### user\_created\_date
|
147
|
-
|
148
|
-
The date at which the user was created.
|
149
|
-
|
150
|
-
# Users have to be a week old to have a key
|
151
|
-
describe aws_iam_access_keys.where { user_created_date > Date.now - 7 }
|
152
|
-
it { should_not exist }
|
153
|
-
end
|
154
|
-
|
155
|
-
<br>
|
156
|
-
|
157
|
-
## Properties
|
158
|
-
|
159
|
-
* `access_key_ids`, `entries`
|
160
|
-
|
161
|
-
## Property Examples
|
162
|
-
|
163
|
-
### access\_key\_ids
|
164
|
-
|
165
|
-
Provides a list of all access key IDs matched.
|
166
|
-
|
167
|
-
describe aws_iam_access_keys do
|
168
|
-
its('access_key_ids') { should include('AKIA1234567890ABCDEF') }
|
169
|
-
end
|
170
|
-
|
171
|
-
### entries
|
172
|
-
|
173
|
-
Provides access to the raw results of the query. This can be useful for checking counts and other advanced operations.
|
174
|
-
|
175
|
-
# Allow at most 100 access keys on the account
|
176
|
-
describe aws_iam_access_keys do
|
177
|
-
its('entries.count') { should be <= 100}
|
178
|
-
end
|
179
|
-
|
180
|
-
<br>
|
181
|
-
|
182
|
-
## Matchers
|
183
|
-
|
184
|
-
This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
|
185
|
-
|
186
|
-
### exists
|
187
|
-
|
188
|
-
The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
|
189
|
-
|
190
|
-
# Sally should have at least one access key
|
191
|
-
describe aws_iam_access_keys.where(username: 'sally') do
|
192
|
-
it { should exist }
|
193
|
-
end
|
194
|
-
|
195
|
-
# Don't let fred have access keys
|
196
|
-
describe aws_iam_access_keys.where(username: 'fred') do
|
197
|
-
it { should_not exist }
|
198
|
-
end
|
199
|
-
|
200
|
-
## AWS Permissions
|
201
|
-
|
202
|
-
Your [Principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/intro-structure.html#intro-structure-principal) will need the `iam:ListAccessKeys`, and `iam:ListUsers` action with Effect set to Allow.
|
203
|
-
|
204
|
-
You can find detailed documentation at [Actions, Resources, and Condition Keys for Identity And Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/list_identityandaccessmanagement.html).
|
1
|
+
---
|
2
|
+
title: About the aws_iam_access_keys Resource
|
3
|
+
platform: aws
|
4
|
+
---
|
5
|
+
|
6
|
+
# aws\_iam\_access\_keys
|
7
|
+
|
8
|
+
Use the `aws_iam_access_keys` InSpec audit resource to test properties of some or all IAM Access Keys.
|
9
|
+
|
10
|
+
To test properties of a single Access Key, use the `aws_iam_access_key` resource instead.
|
11
|
+
To test properties of an individual user's access keys, use the `aws_iam_user` resource.
|
12
|
+
|
13
|
+
Access Keys are closely related to AWS User resources. Use this resource to perform audits of all keys or of keys specified by criteria unrelated to any particular user.
|
14
|
+
|
15
|
+
<br>
|
16
|
+
|
17
|
+
## Syntax
|
18
|
+
|
19
|
+
An `aws_iam_access_keys` resource block uses an optional filter to select a group of access keys and then tests that group.
|
20
|
+
|
21
|
+
# Do not allow any access keys
|
22
|
+
describe aws_iam_access_keys do
|
23
|
+
it { should_not exist }
|
24
|
+
end
|
25
|
+
|
26
|
+
# Don't let fred have access keys, using filter argument syntax
|
27
|
+
describe aws_iam_access_keys.where(username: 'fred') do
|
28
|
+
it { should_not exist }
|
29
|
+
end
|
30
|
+
|
31
|
+
# Don't let fred have access keys, using filter block syntax (most flexible)
|
32
|
+
describe aws_iam_access_keys.where { username == 'fred' } do
|
33
|
+
it { should_not exist }
|
34
|
+
end
|
35
|
+
|
36
|
+
<br>
|
37
|
+
|
38
|
+
## Examples
|
39
|
+
|
40
|
+
The following examples show how to use this InSpec audit resource.
|
41
|
+
|
42
|
+
### Disallow access keys created more than 90 days ago
|
43
|
+
|
44
|
+
describe aws_iam_access_keys.where { created_days_ago > 90 } do
|
45
|
+
it { should_not exist }
|
46
|
+
end
|
47
|
+
|
48
|
+
<br>
|
49
|
+
|
50
|
+
## Filter Criteria
|
51
|
+
* `active`, `create_date`, `created_days_ago`, `created_hours_ago`, `created_with_user`, `ever_used`, `inactive`, `last_used_date`, `last_used_hours_ago`, `last_used_days_ago`, `never_used`, `user_created_date`
|
52
|
+
|
53
|
+
<br>
|
54
|
+
|
55
|
+
## Filter Examples
|
56
|
+
|
57
|
+
### active
|
58
|
+
|
59
|
+
A true / false value indicating if an Access Key is currently "Active" (the normal state) in the AWS console. See also: `inactive`.
|
60
|
+
|
61
|
+
# Check if a particular key is enabled
|
62
|
+
describe aws_iam_access_keys.where { active } do
|
63
|
+
its('access_key_ids') { should include('AKIA1234567890ABCDEF')}
|
64
|
+
end
|
65
|
+
|
66
|
+
### create\_date
|
67
|
+
|
68
|
+
A DateTime identifying when the Access Key was created. See also `created_days_ago` and `created_hours_ago`.
|
69
|
+
|
70
|
+
# Detect keys older than 2017
|
71
|
+
describe aws_iam_access_keys.where { create_date < DateTime.parse('2017-01-01') } do
|
72
|
+
it { should_not exist }
|
73
|
+
end
|
74
|
+
|
75
|
+
### created\_days\_ago, created\_hours\_ago
|
76
|
+
|
77
|
+
An integer, representing how old the access key is.
|
78
|
+
|
79
|
+
# Don't allow keys that are older than 90 days
|
80
|
+
describe aws_iam_access_keys.where { created_days_ago > 90 } do
|
81
|
+
it { should_not exist }
|
82
|
+
end
|
83
|
+
|
84
|
+
### created\_with\_user
|
85
|
+
|
86
|
+
A true / false value indicating if the Access Key was likely created at the same time as the user, by checking if the difference between created_date and user_created_date is less than 1 hour.
|
87
|
+
|
88
|
+
# Do not automatically create keys for users
|
89
|
+
describe aws_iam_access_keys.where { created_with_user } do
|
90
|
+
it { should_not exist }
|
91
|
+
end
|
92
|
+
|
93
|
+
### ever\_used
|
94
|
+
|
95
|
+
A true / false value indicating if the Access Key has ever been used, based on the last_used_date. See also: `never_used`.
|
96
|
+
|
97
|
+
# Check to see if a particular key has ever been used
|
98
|
+
describe aws_iam_access_keys.where { ever_used } do
|
99
|
+
its('access_key_ids') { should include('AKIA1234567890ABCDEF')}
|
100
|
+
end
|
101
|
+
|
102
|
+
### inactive
|
103
|
+
|
104
|
+
A true / false value indicating if the Access Key has been marked Inactive in the AWS console. See also: `active`.
|
105
|
+
|
106
|
+
# Don't leave inactive keys laying around
|
107
|
+
describe aws_iam_access_keys.where { inactive } do
|
108
|
+
it { should_not exist }
|
109
|
+
end
|
110
|
+
|
111
|
+
### last\_used\_date
|
112
|
+
|
113
|
+
A DateTime identifying when the Access Key was last used. Returns nil if the key has never been used. See also: `ever_used`, `last_used_days_ago`, `last_used_hours_ago`, and `never_used`.
|
114
|
+
|
115
|
+
# No one should do anything on Mondays
|
116
|
+
describe aws_iam_access_keys.where { ever_used and last_used_date.monday? } do
|
117
|
+
it { should_not exist }
|
118
|
+
end
|
119
|
+
|
120
|
+
### last\_used\_days\_ago, last\_used\_hours\_ago
|
121
|
+
|
122
|
+
An integer representing when the key was last used. See also: `ever_used`, `last_used_date`, and `never_used`.
|
123
|
+
|
124
|
+
# Don't allow keys that sit unused for more than 90 days
|
125
|
+
describe aws_iam_access_keys.where { last_used_days_ago > 90 } do
|
126
|
+
it { should_not exist }
|
127
|
+
end
|
128
|
+
|
129
|
+
### never\_used
|
130
|
+
|
131
|
+
A true / false value indicating if the Access Key has never been used, based on the `last_used_date`. See also: `ever_used`.
|
132
|
+
|
133
|
+
# Don't allow unused keys to lay around
|
134
|
+
describe aws_iam_access_keys.where { never_used } do
|
135
|
+
it { should_not exist }
|
136
|
+
end
|
137
|
+
|
138
|
+
### username
|
139
|
+
|
140
|
+
Searches for access keys owned by the named user. Each user may have zero, one, or two access keys.
|
141
|
+
|
142
|
+
describe aws_iam_access_keys(username: 'bob') do
|
143
|
+
it { should exist }
|
144
|
+
end
|
145
|
+
|
146
|
+
### user\_created\_date
|
147
|
+
|
148
|
+
The date at which the user was created.
|
149
|
+
|
150
|
+
# Users have to be a week old to have a key
|
151
|
+
describe aws_iam_access_keys.where { user_created_date > Date.now - 7 }
|
152
|
+
it { should_not exist }
|
153
|
+
end
|
154
|
+
|
155
|
+
<br>
|
156
|
+
|
157
|
+
## Properties
|
158
|
+
|
159
|
+
* `access_key_ids`, `entries`
|
160
|
+
|
161
|
+
## Property Examples
|
162
|
+
|
163
|
+
### access\_key\_ids
|
164
|
+
|
165
|
+
Provides a list of all access key IDs matched.
|
166
|
+
|
167
|
+
describe aws_iam_access_keys do
|
168
|
+
its('access_key_ids') { should include('AKIA1234567890ABCDEF') }
|
169
|
+
end
|
170
|
+
|
171
|
+
### entries
|
172
|
+
|
173
|
+
Provides access to the raw results of the query. This can be useful for checking counts and other advanced operations.
|
174
|
+
|
175
|
+
# Allow at most 100 access keys on the account
|
176
|
+
describe aws_iam_access_keys do
|
177
|
+
its('entries.count') { should be <= 100}
|
178
|
+
end
|
179
|
+
|
180
|
+
<br>
|
181
|
+
|
182
|
+
## Matchers
|
183
|
+
|
184
|
+
This InSpec audit resource has the following special matchers. For a full list of available matchers, please visit our [matchers page](https://www.inspec.io/docs/reference/matchers/).
|
185
|
+
|
186
|
+
### exists
|
187
|
+
|
188
|
+
The control will pass if the filter returns at least one result. Use `should_not` if you expect zero matches.
|
189
|
+
|
190
|
+
# Sally should have at least one access key
|
191
|
+
describe aws_iam_access_keys.where(username: 'sally') do
|
192
|
+
it { should exist }
|
193
|
+
end
|
194
|
+
|
195
|
+
# Don't let fred have access keys
|
196
|
+
describe aws_iam_access_keys.where(username: 'fred') do
|
197
|
+
it { should_not exist }
|
198
|
+
end
|
199
|
+
|
200
|
+
## AWS Permissions
|
201
|
+
|
202
|
+
Your [Principal](https://docs.aws.amazon.com/IAM/latest/UserGuide/intro-structure.html#intro-structure-principal) will need the `iam:ListAccessKeys`, and `iam:ListUsers` action with Effect set to Allow.
|
203
|
+
|
204
|
+
You can find detailed documentation at [Actions, Resources, and Condition Keys for Identity And Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/list_identityandaccessmanagement.html).
|